Subscription 790/year or 190/quarter

trojans

...




(THIS ARTICLE IS MACHINE TRANSLATED by Google from Norwegian)

Trojans – or "Trojans" – often hide in other programs you install on your computer, and are hidden add-ons that purposefully infiltrate computers, tablets, and smartphones, and perform unwanted actions without the user noticing.

Trojans are characterized by pretending to be something they are not. It may be a program or file that will "check your computer for errors or viruses", "update a driver", or invite you to join in on something fun just by clicking on a picture or similar – as soon as you have done this, your machine is infected.

Trojans are a type of malware that – unlike computer viruses – require the recipient to somehow launch the program themselves. Trojans can infect your computer by, for example, downloading free programs / files from the Internet, Facebook, email, CD-ROM, DVD, anti-virus programs, screen protectors or the like. The free package contains a file (Trojan) that is installed and activated at the same time as the download. These malware programs are self-contained and autonomous, which means that they cannot be deactivated by deleting or quitting the Trojan program. For example, autonomous spyware can end up on your computer (for example, so-called sniffers, or components that record keyboard movements, so-called "keyloggers"). Similarly, Trojans can install backdoor programs that allow you to remotely control your computer from another network (such as the Internet).

Trojans attack all computers, be it Windows, Mac or Linux based machines, as well as tablets and smartphones that use Android or iPhone as the operating system.

The purpose of a Trojan is to steal information, upload files that others can retrieve, or use your machine to host attacks against other computers (as part of a botnet).

Trojans are becoming more and more sophisticated and intriguing, which makes it very difficult to detect them. In addition to entering the main Windows file, they also scan for installed anti-virus programs and other programs installed to detect spyware. These are then disabled by the Trojan while making it impossible for the user to update these programs. All to avoid being able to find and remove the Trojan from your computer.

See Germany's new digital inquisition
China's digital glasses
Aadhaar: India's new caste system

Hans-Georg Kohler
Hans-Georg Kohler
Kohler is a regular reviewer for Ny Tid. Artist.

You may also like